Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.121.45.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8043
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;147.121.45.201.			IN	A

;; AUTHORITY SECTION:
.			470	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021103 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 09:05:00 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 201.45.121.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.45.121.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.209.0.51 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 50000 proto: TCP cat: Misc Attack
2020-06-21 07:15:17
115.178.119.110 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-21 07:38:12
146.88.240.4 attack
Multiport scan : 31 ports scanned 17 19 53 69 111 123(x2) 137 161 389 500 520 623 1194 1434 1604 1701 1900(x2) 3283 3702 5060 5093 5353 5683(x2) 7781 10001 11211 21026 27016 27018 27960 47808
2020-06-21 07:21:41
13.249.120.102 attackbots
ET INFO TLS Handshake Failure - port: 59165 proto: TCP cat: Potentially Bad Traffic
2020-06-21 07:50:27
94.102.51.17 attack
Jun 21 01:33:05 debian-2gb-nbg1-2 kernel: \[14954667.351434\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.17 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=17368 PROTO=TCP SPT=42407 DPT=59831 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-21 07:39:43
51.210.15.231 attack
Jun 21 01:39:26 debian-2gb-nbg1-2 kernel: \[14955048.539397\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.210.15.231 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=38894 PROTO=TCP SPT=43404 DPT=5903 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-21 07:45:57
141.98.81.150 attackspam
 TCP (SYN) 141.98.81.150:37964 -> port 1080, len 60
2020-06-21 07:21:57
89.248.162.232 attackbotsspam
06/20/2020-16:38:40.251079 89.248.162.232 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-21 07:41:13
185.209.0.92 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 33988 proto: TCP cat: Misc Attack
2020-06-21 07:14:45
185.39.11.57 attackspambots
CH_RIPE-NCC-HM-MNT_<177>1592694138 [1:2402000:5581] ET DROP Dshield Block Listed Source group 1 [Classification: Misc Attack] [Priority: 2]:  {TCP} 185.39.11.57:42051
2020-06-21 07:35:34
185.156.73.91 attack
Port scan: Attack repeated for 24 hours
2020-06-21 07:34:39
87.251.74.214 attackspam
06/20/2020-19:34:38.714093 87.251.74.214 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-21 07:42:39
113.141.64.31 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-21 07:22:15
185.209.0.32 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 33889 proto: TCP cat: Misc Attack
2020-06-21 07:51:54
83.97.20.31 attackspam
Jun 21 01:25:10 debian-2gb-nbg1-2 kernel: \[14954192.904050\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=83.97.20.31 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=58647 DPT=1433 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-21 07:44:54

Recently Reported IPs

86.90.11.245 45.141.84.90 194.157.184.94 94.231.68.222
187.163.114.156 141.98.81.133 178.143.7.39 88.148.124.82
180.127.94.167 113.172.199.125 36.235.173.241 183.89.237.23
171.229.227.100 124.123.40.181 118.24.199.224 67.75.106.142
172.167.173.140 183.89.212.25 177.87.151.113 125.161.136.30